Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/303628
Title: Design of fog computing based self protection system in internet of things
Researcher: Prabavathy S
Guide(s): Sundarakantham K
Keywords: Engineering and Technology
Computer Science
Computer Science Software Engineering
Internet of Things
Digital world
Fog computing
University: Anna University
Completed Date: 2018
Abstract: Internet of Things IoT is the future facing technology of digital world which connects the previously unconnected real world objects to internet IoT is penetrating into every aspect of our lives including our body home car and living environment This hyper connectivity and the heterogeneity characteristic of IoT have widened the attack surface of IoT Moreover IoT devices are deployed both in managed and unmanaged environment which make it vulnerable for attackers to create novel attacks The volume of data generated and the processing latency make the existing cloud based security mechanisms inadequate to handle the ever growing attacks in IoT Certain cyber attacks in IoT applications can lead to catastrophe and hence the attack has to be identified as early as possible to stop or reduce its impact by activating suitable response Therefore IoT requires self protect security mechanisms which can automatically interpret the attacks in IoT traffic and efficiently handle the attack scenario by activating appropriate response at a faster rate This requirement is satisfied by fog computing which can incorporate the intelligent self protection mechanism in the distributed fog nodes to handle the attack scenario at a faster rate and protect the IoT application with minimal human intervention This thesis seeks to design and develop a self protection system in IoT using fog computing to interpret the cyber attacks and efficiently handle them by suitable response The main objective of this research work is to implement the self protection mechanism at the distributed fog nodes which can autonomously detect the known attacks from the predefined attack patterns as well as predict the novel attacks with no predefined attack patterns and select the suitable response to neutralize the identified attack. newline
Pagination: xvi,136p.
URI: http://hdl.handle.net/10603/303628
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File24.98 kBAdobe PDFView/Open
02_certificates.pdf189.4 kBAdobe PDFView/Open
03_abstracts.pdf8.62 kBAdobe PDFView/Open
04_acknowledgements.pdf5.29 kBAdobe PDFView/Open
05_contents.pdf13.13 kBAdobe PDFView/Open
06_list_of_tables.pdf5.82 kBAdobe PDFView/Open
07_list_of_figures.pdf10.02 kBAdobe PDFView/Open
08_list_of_abbreviations.pdf9.91 kBAdobe PDFView/Open
09_chapter1.pdf377.36 kBAdobe PDFView/Open
10_chapter2.pdf197.98 kBAdobe PDFView/Open
11_chapter3.pdf567.57 kBAdobe PDFView/Open
12_chapter4.pdf692.11 kBAdobe PDFView/Open
13_chapter5.pdf911.61 kBAdobe PDFView/Open
14_conclusion.pdf28.55 kBAdobe PDFView/Open
15_references.pdf148.66 kBAdobe PDFView/Open
16_list_of_publications.pdf107.43 kBAdobe PDFView/Open
80_recommendation.pdf157.62 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: